Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
9f231b476d56f219aece67db85e5f257_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9f231b476d56f219aece67db85e5f257_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9f231b476d56f219aece67db85e5f257_JaffaCakes118.html
-
Size
254B
-
MD5
9f231b476d56f219aece67db85e5f257
-
SHA1
bc60fd65c7cd34d66c6ffb1df6795a2ef3251069
-
SHA256
480d8a553f86ae2c12f9c21c7d6c0ed7b85518f791f8a73b55943eaeb4acc051
-
SHA512
0b8af3c6646b6a31faa4cf477a0a3208b9e06a30d001b8ce18bbdf8480a4333c6843ca9daa242ae1f81c9285a73f2b98ec036d1aff77142e5ca5ae6ced66e02c
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2BD39DC1-2820-11EF-AFF6-E61A8C993A67} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dfa1cd816208e14688c68e161e4f2ca4000000000200000000001066000000010000200000006a6559ec3b340bfe00b59ef7fd2ed092edf732c8ce0ac79381c3f651c9c90594000000000e800000000200002000000035fd138a2c1e4e3648db1bb2c47c4892a6778b8d3e119f99e02c6747e7e78c61900000000b3ec3e31f403ce43e2c540a44493ec8d650a6e307f033add14c3edceb613d6703b53853c020ef3eef6ba61742e72dd14d72459a506c092d165dbe4f77a88a37cac80be19e3cc18d8a76aefa22df4a69c9a7c4cf606869a1321f9063f3c926b739082d2e601705f42b43ed6d26ba9d9d7b4f27e41c01eafd0e4efc278028d7808a2b69e272880124aa81698db48fcb46400000004117bb44a1149f8017a09c488cc387a5fa5d22022effc2dec9a2e4856e2d73f2c4ecc170a66f0e159a7516e5ec0f4a8e8b67766ec28a06decd30fbdc7e038470 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10fecb002dbcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424292280" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dfa1cd816208e14688c68e161e4f2ca40000000002000000000010660000000100002000000005e05e11ab3d43078932ad571d030eeaf71d7791ab97be3d3a27d3eeec91d684000000000e80000000020000200000003450b869b0a3e58369407fb75840760eddce7b703faec40d7b1386a8d7ff0ffd20000000cc777112a8b9864745d975d9bbf111ad2d9cf10c09e9c0cb08672766655cb35a400000008c32db1c82e9e3b529105ff4da28034bd29ba0bc2b08a9df2805430a8dd8d92cad94b17f3c924bcf674d8b7500ea53c5d5927a3e274bda48f0d3b741e6d4afd0 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2240 iexplore.exe 2240 iexplore.exe 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2240 wrote to memory of 1404 2240 iexplore.exe IEXPLORE.EXE PID 2240 wrote to memory of 1404 2240 iexplore.exe IEXPLORE.EXE PID 2240 wrote to memory of 1404 2240 iexplore.exe IEXPLORE.EXE PID 2240 wrote to memory of 1404 2240 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9f231b476d56f219aece67db85e5f257_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5770e7d25ef3fbc6eadff4c7faff9d3e0
SHA16164fe17a7732e422be55d423a588a818a5f5303
SHA2567f428177c9582b650f3771693e074e53ea509d90fb51c5e8a7048532b990eaf5
SHA5122b66fcf5029ffac5eee5d2b6648a015ec2b1b4e1e67b722e9a7d4ff7186fd7b05ce99b3bf33bf86b400d61097d7266c2a5e5c87ae55da2ff751802cfc9de361d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5734b6a89166524185fa805189dbf2359
SHA103eff7789b4e0e64427e323bc5def2649683f19d
SHA256a577e15dc526686ed0adc17f6c5abc5cd126f87bf99faed5d9fe4fc16c05f878
SHA512b6c07ec33bad7356c45c0c9752ab5e48d089bacefe8f9db809d8f1d93d66cbc8e1a8d3c2f7e5d2d5f602f6ffb90dc130648e14793f84632927699929085d5487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56516b8bd5adb0bf8942671886a80a9cd
SHA1d3d2639ec7f605049ed15eb59df3c552437ec3c7
SHA2567a422229cd2c06432225ebb2d154ca180fef94a5988afe4c398bb151f4382e95
SHA512da09e054c746b5830fe640ca6f59a28d46a89c7d7890a5e12b6ffc324ad42ad1f946a45ad4d61a64abdda6a52c54d9bbc59ee7744d0a57390b76fcfd51d797e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad5c0d153d6f3e7e8e41fa7812d3dca
SHA16fae4b5302371e0dec41cda5be9565d79fb60b1a
SHA256d674bc545d37b352e8e3aac47aca3d2d8968a787e8e88338d6118e982a2f4326
SHA5121f58f5afd0fce17da47b3c33227a058e0e6e514894d481ee94f511682f5e7cb78b730dce09a6c384d2dae895250d7c46884d2c4112f2d9ff02ea7af61597bbeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c09ec1e98c420f6312145484dd6fe7e
SHA133e93bb1e97306d38bb5b8dc51262d9c8edd5271
SHA25609417057ec2eb438c996bdbfc8d194eca704ac1bddc592a907bf6d51602cbbc6
SHA51289dab34ccfa1bde6c95412be7acf9a51a9da8511a55815a51d840ced5cc22d0cefa7ec35a3e211f910094566fc4000377a797eb5dc98612d4e2dad579f13f355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba69d510b1365c3a0e6b7f9d5f4c88d9
SHA1662e1b7c1f48a68ba9683e5a1b57ee345e7a2583
SHA256b1e434de7f4589e32949fb8f9cc3b9a3b2054f2501ba3e5ae064857403400e54
SHA5129b2f683b0cb54785582d780d16f66aeee1040c1f247333a7114dc54741458e2e4611db7ebfb0443cb553c3ffbf8e77b4780479e5f0b579676ec2f656f4252f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517bcd7988823b7abec00811412053b6e
SHA187938fb5249cf048c12eeec39b674de50485571e
SHA256dfcea858b2605b4a41117da664c836b6932cc2c80deb6297cde1d94afbb17aa9
SHA512dbd556ed8ecea564a1c2c1d32e27bb8f0ad6c215868a3e558934fc1c381c76c3969460a96d803591045eaf904b4db2e7be2b9fd74f916687e709a6f6c8ce85ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b614e6ed57dea2ecf0899b69617a271
SHA16832868bec4a338616ef335118cff358fbbed3e7
SHA256b5f66cbf431a81828596eff03328479121be9e3332efff269f4f1e1371d4f663
SHA512e917c8ef6c3eccf5064958016f53fcfc7fadbe4fc03216f0b00a63e7f1b6f6e2e2eb351fb010e2b225ebe463b7812779f4b253afdc3b70cf5a84e5216ebeba87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552244ba12a0bfdb6936cca3f5b0cb188
SHA11191841732c0555ce57aa2291bf6f1fce4eb31c1
SHA2565516280d3094787dc392f2055fe8f75abb90b48d404d5a56828d30ae9e7b6a53
SHA512fa3dcdaa05cb5e743495ec7c1121a96bd4b17b180b14ba50b76180d0e093669be9abdf41849e196b69e62f4384c63ea124ba05a9ac8dd1bd69b3b12ac0e5d413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59102fbaa671c1f1c662ca0d0b4fb3419
SHA14aeb554b4a49a322b6bc8e1b7a37ac289cd4a79d
SHA25676fb1f178e39366c9590ea5f3a6693c363e8712b0835061e18f5b1bbe003bfd2
SHA51276be2bfdcb6639dbb397301ec6e53c759b4af0e3baabf8363cc5438c9cb351419a048e79ad14b668759be4993247415d16bd95647fcf914b9d45b59c65f73516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ff98e025ce473b50e3fdf14e59389b7
SHA19de35e879d5cf9c48429197da78bad7b9d7b76dd
SHA256ce2df9faf3f97c196f295d6751125c9933fd863c0272888248871ddf149a691e
SHA512704f61060795d7b11d36e637c735b5aa31a3e95ae619648cdec425d886890244373378003fd71835e1d382ecb5ad3d1f8ef535c87e6be7fcae6db13825e3ec83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efb4e89ad2d95720b9466ec49517169d
SHA186544b5ac3cb9f0ce501a5f20350bc4f8447e58e
SHA2567b989b049eca171fe5de55bd3e93c4c3e12d558fb07693e6e0034ccbfca54f7f
SHA5128136039d6eefa8eaa19797220e485d4f2e761b44709f8a09ecc1ddc38deecf8edaee6cb57a3681bbe0217c3f641bfc71c20aa308fea4d188a394e9bd0e595328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588065555d9b408be4dd460ef527c9181
SHA18e9f46d05683f7b890a6c88fbc3a422c31831c4a
SHA2567550c2693b48f2697fe2d5d0cf99ae56d27ed66794893e1f9c26760a2adf3b52
SHA512701fd875d2f7fcacba3f54466f2e669b5686a95daf046e203d4b6fc33984225afbca251cb1a86a2dbf55234f6c0972c6a9621e0b3a47ce8f12f0fccc5c8ff252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f175ab363574a3df9fc1c9a4a4f0af8d
SHA19efad66c52618fff64cb9d6db18a4baedd166795
SHA256dc4f7bc3f10f367c85dbdc7a713acb0cc33342eb9e9555a948ae0d45d50afa6c
SHA512cb040ed6aa65c797fb000972fd0a1f347aae9ada5aabbd2aa1cd5ac03634cc49121ede7a028481efaaec252459ecaaa7db486a99ac24a102f7b4dbbbf75c3962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c3ba2b1c8a753e4aab950c45fafd39c
SHA154ce1d8e3534acea9099c3ab525aefefce42faf7
SHA256644b1bd6fa3db871d05bafed180f2c064b5d16c9f67a6b56972d54c4de11387a
SHA512c273923bb205ee71bfbd7f57b48f1128806cd399ca6d9b85eae9099d0db661065e877d2652496d0b6adbeb964c814fafabdd3e2e46f52d39ebbdcd4152ad25d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542e7219f3a29931d18778aa980492389
SHA1ca9481f3426f80c330958bc90d3d4b05e5d72765
SHA25639b61070ee0d231474ff8b967e419635d333d7e18d9974b98969e0860c7bb8c5
SHA512e57cb24dec6885659d673c8803afbe7753d0870f3bbab24461449168f369bd5fcc604624ca9f207d3693d5f8611c6d08c6a18f486cd21d4ab75c9672114ecbb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cf72841fbbb1294fb3ed984c6a68317
SHA1d3b13cfba491906390179ddc4ef8930b6988c6d6
SHA2567ad1e87714439b3559fc0a31db9d54a119b978211c35b53280a298345f7b06d4
SHA5128793140623dbe941fea16366f5c4527f6ef30ea4a67c9b8d2f051800eabb95f398a4a1448ec1f826997f3435c19a5994b11928e319c3b75bf07a8e1d46b0a269
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b